US military computer networks vulnerable: general

Mar 16, 2011
The US military has made huge strides in hardening its computer networks against cyberattack but more remains to be done, the Pentagon's top cyberwarrior said Wednesday. "I would give us today probably a 'C,' going up," General Keith Alexander, pictured in 2010, said when asked during a House Armed Services Committee hearing to grade the ability of the Defense Department to defend its networks.

The US military has made huge strides in hardening its computer networks against cyberattack but more remains to be done, the Pentagon's top cyberwarrior said Wednesday.

"I would give us today probably a 'C,' going up," General Keith Alexander said when asked during a House Armed Services Committee hearing to grade the ability of the Defense Department to defend its networks.

"The reason I say a 'C' is we are working extremely hard on building the hardening part of our networks," said Alexander, head of the Pentagon's Cyber Command and the top secret .

"I'd like to say an 'A' but I think it's going to take some time to get to an 'A' and an 'A' is where I believe nobody can penetrate the network," he said.

"We have made it extremely difficult for adversaries to get in and every day we improve that," Alexander said, adding there had been "tremendous progress over the last two years."

"When you look at the problems we had on our networks a few years ago to where we are today it's a huge improvement," he said.

Alexander and another witness, James Miller, the Pentagon's principal deputy undersecretary for policy, were also asked what was being done to combat Islamic militant propaganda on the Internet.

"To my knowledge there's no decision to block the radical propaganda," the general said, adding that Cyber Command had not been told to do so.

"I think that's a policy issue in terms of whether we choose to stem the flow of radical propaganda and how," Alexander said. "Technically, Cyber Command could be one of the agencies given that mission.

"We have not been given that mission," he said.

At the same time, "if we see this on US and it's wrong we can reach out through the and ask that it be removed," Alexander said. "And we have a high success rate getting that done."

"We're not reaching out and causing it to be removed globally," he continued. "We can reach out and ask that it be removed globally and we're having a pretty good success at doing that."

Miller said dealing with such material on the Internet is a "recurring ongoing policy issue."

"These issues need to be dealt with on a case-by-case basis," he said, using "all the tools available to us, including diplomatic tools" and balancing "our desire to promote free speech and our requirement to protect our forces and our people."

Explore further: Study shows role of media in sharing life events

add to favorites email to friend print save as pdf

Related Stories

US reviewing ways to fight cyber attacks: general

Sep 24, 2010

The White House is looking at boosting the authority of the US military and other agencies to protect the country's infrastructure from possible cyber attack, a top general said Thursday.

Cyber Command chief warns of 'remote sabotage'

Jun 03, 2010

The top US cyberwarrior said Thursday that Pentagon networks are probed over six million times a day and expressed concern about a rise in "remote sabotage" attacks on computer systems.

Gates approves creation of new cyber command

Jun 23, 2009

(AP) -- Defense Secretary Robert Gates has formally ordered the creation of a new military cyber command that will coordinate the Pentagon's efforts to defend its networks and conduct cyberwarfare.

US program to detect cyberattacks on companies, agencies

Jul 08, 2010

The United States is launching a program to detect cyberattacks on private US companies and government agencies running critical infrastructure such as the electricity grid and nuclear power plants, The Wall ...

Recommended for you

Study shows role of media in sharing life events

14 hours ago

To share is human. And the means to share personal news—good and bad—have exploded over the last decade, particularly social media and texting. But until now, all research about what is known as "social sharing," or the ...

UK: Former reporter sentenced for phone hacking

21 hours ago

(AP)—A former British tabloid reporter was given a 10-month suspended prison sentence Thursday for his role in the long-running phone hacking scandal that shook Rupert Murdoch's media empire.

Evaluating system security by analyzing spam volume

22 hours ago

The Center for Research on Electronic Commerce (CREC) at The University of Texas at Austin is working to protect consumer data by using a company's spam volume to evaluate its security vulnerability through the SpamRankings.net ...

Surveillance a part of everyday life

23 hours ago

Details of casual conversations and a comprehensive store of 'deleted' information were just some of what Victoria University of Wellington students found during a project to uncover what records companies ...

European Central Bank hit by data theft

23 hours ago

(AP)—The European Central Bank said Thursday that email addresses and other contact information have been stolen from a database that serves its public website, though it stressed that no internal systems or market-sensitive ...

Twitter admits to diversity problem in workforce

Jul 24, 2014

(AP)—Twitter acknowledged Wednesday that it has been hiring too many white and Asian men to fill high-paying technology jobs, just like several other major companies in Silicon Valley.

User comments : 0